Login / Signup

Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer.

Muhammad Mahboob Ur RahmanAneela YasmeenQammer H. Abbasi
Published in: VTC Spring (2017)
Keyphrases